Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe
Resource
win10v2004-20230220-en
General
-
Target
a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe
-
Size
551KB
-
MD5
1a0a9f0c29a3f2b902cc7964d1490d21
-
SHA1
eccbf588d28ed6365b807f8bcc84098cc3bab829
-
SHA256
a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1
-
SHA512
7bd062037c005f9342f5354b1dafe1b0c0351801e9115f7b5ee7bc54c92904844c8b2c5276494609000fe923eb626c32758c55696051b14c2df3578e067206ee
-
SSDEEP
12288:JMrgy90dRvVAYbZ3gdnoceEwzLu8duuQ2M4fS:xyeV7b2oUk68YOM46
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw59qx15JL73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw59qx15JL73.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw59qx15JL73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw59qx15JL73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw59qx15JL73.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw59qx15JL73.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/212-155-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-156-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-158-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-162-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-165-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-167-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-169-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-171-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-173-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-175-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-177-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-179-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-181-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-183-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-185-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-187-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-189-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-191-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-193-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-195-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-197-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-199-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-201-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-203-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-205-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-207-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-209-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-211-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-213-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-215-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-217-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-219-0x0000000007320000-0x000000000735E000-memory.dmp family_redline behavioral1/memory/212-221-0x0000000007320000-0x000000000735E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3080 vpg1990FS.exe 4412 sw59qx15JL73.exe 212 tsz85jO42.exe 4972 uOg08oV28.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw59qx15JL73.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vpg1990FS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vpg1990FS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3328 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4480 212 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4412 sw59qx15JL73.exe 4412 sw59qx15JL73.exe 212 tsz85jO42.exe 212 tsz85jO42.exe 4972 uOg08oV28.exe 4972 uOg08oV28.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4412 sw59qx15JL73.exe Token: SeDebugPrivilege 212 tsz85jO42.exe Token: SeDebugPrivilege 4972 uOg08oV28.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3080 5116 a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe 85 PID 5116 wrote to memory of 3080 5116 a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe 85 PID 5116 wrote to memory of 3080 5116 a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe 85 PID 3080 wrote to memory of 4412 3080 vpg1990FS.exe 86 PID 3080 wrote to memory of 4412 3080 vpg1990FS.exe 86 PID 3080 wrote to memory of 212 3080 vpg1990FS.exe 90 PID 3080 wrote to memory of 212 3080 vpg1990FS.exe 90 PID 3080 wrote to memory of 212 3080 vpg1990FS.exe 90 PID 5116 wrote to memory of 4972 5116 a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe 95 PID 5116 wrote to memory of 4972 5116 a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe 95 PID 5116 wrote to memory of 4972 5116 a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe"C:\Users\Admin\AppData\Local\Temp\a5b64e80944a8bc466b913ba5c246eb24ed63f533c8beb15ccd697191fe165b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vpg1990FS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vpg1990FS.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw59qx15JL73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw59qx15JL73.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsz85jO42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tsz85jO42.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 16044⤵
- Program crash
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOg08oV28.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOg08oV28.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 212 -ip 2121⤵PID:4800
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5cf4601f34173a0c6b95faccb8184c4b8
SHA1e68a609609d41c943f17dad9cb18924fe8c101e5
SHA2562ca9b6aa0a964ed6cd1bb083819b38ea582ac4599023be287a98ca7765eda244
SHA512d73e51e27f3a866724d81c9b431cce37c2dd3f9f5e0b3a24dc37a1090b388fb1429ace9134c2d3915b0f7b20c047663963b062840d1a52a5b692f4405d046d4d
-
Filesize
175KB
MD5cf4601f34173a0c6b95faccb8184c4b8
SHA1e68a609609d41c943f17dad9cb18924fe8c101e5
SHA2562ca9b6aa0a964ed6cd1bb083819b38ea582ac4599023be287a98ca7765eda244
SHA512d73e51e27f3a866724d81c9b431cce37c2dd3f9f5e0b3a24dc37a1090b388fb1429ace9134c2d3915b0f7b20c047663963b062840d1a52a5b692f4405d046d4d
-
Filesize
406KB
MD557ec930586eddf06701669925b5b481d
SHA124d48a479f80fd2c143608d69c897e905f98c931
SHA25604dc08517d2eebcb06a5fdbc851246f96e8a0b71e5607aa5568cf03438eb98df
SHA5122c8bb9a15feddbd7355488380d6cacba285685dbc0ad6703220805e80e0840c86d47ed780eefa82072e0caab150c1c74bb05d7da6cb1f85a5420880da1c642ff
-
Filesize
406KB
MD557ec930586eddf06701669925b5b481d
SHA124d48a479f80fd2c143608d69c897e905f98c931
SHA25604dc08517d2eebcb06a5fdbc851246f96e8a0b71e5607aa5568cf03438eb98df
SHA5122c8bb9a15feddbd7355488380d6cacba285685dbc0ad6703220805e80e0840c86d47ed780eefa82072e0caab150c1c74bb05d7da6cb1f85a5420880da1c642ff
-
Filesize
17KB
MD5cf4148568aad3433eb5b0ab6379dbaae
SHA1c547df6b086cffb1f6867e26b0f0a43855da556e
SHA2563f48e4dd616486dacf9b82ca033a3fca3bcc87a026fa9cf7f370f4cd96fd24d7
SHA5129494fcf5eb6b92dfb7a0be8b8e1ac190509197c1ce6810b6062bc60b28cf4cf5924345cecd5c93cdd09dffd5531a254bf4f2352056fb4d4fb5d6acd43ff7d7ed
-
Filesize
17KB
MD5cf4148568aad3433eb5b0ab6379dbaae
SHA1c547df6b086cffb1f6867e26b0f0a43855da556e
SHA2563f48e4dd616486dacf9b82ca033a3fca3bcc87a026fa9cf7f370f4cd96fd24d7
SHA5129494fcf5eb6b92dfb7a0be8b8e1ac190509197c1ce6810b6062bc60b28cf4cf5924345cecd5c93cdd09dffd5531a254bf4f2352056fb4d4fb5d6acd43ff7d7ed
-
Filesize
387KB
MD5066b5456cc754c4c01232eb5f6528b57
SHA1a530c7bbf3cda6f6edf3d5b210a43630d3828f40
SHA256b428258fc52be23096aa6c4e68251e60514dedcd2ee8a4cdca2f60d3f55a1630
SHA51209ac6e0aa74919ee2321b79f267cf14baf3a8cb2bf3e589ae3b764af1e7ce495bea67c9ebcfcbb92ac4b4c3d8557052a1c979066138f0c4439a8c4d5e38878d5
-
Filesize
387KB
MD5066b5456cc754c4c01232eb5f6528b57
SHA1a530c7bbf3cda6f6edf3d5b210a43630d3828f40
SHA256b428258fc52be23096aa6c4e68251e60514dedcd2ee8a4cdca2f60d3f55a1630
SHA51209ac6e0aa74919ee2321b79f267cf14baf3a8cb2bf3e589ae3b764af1e7ce495bea67c9ebcfcbb92ac4b4c3d8557052a1c979066138f0c4439a8c4d5e38878d5